Feeds:
Posts
Comments

Secrets of Success – an excerpt from “ Good Guys Wear BLACK” – the Life and Times of a Crisis Manager “

Over the past 40 years, I have learned and hopefully executed the characteristics for success, outlined below, in good and turbulent times. They are tried and true.

1.  Have Ethics and Integrity – Be Dependable and Responsible

2.  Attitude – Always, Always be Positive

3.  Desire – Have the desire to do the Best You Can

4.  Consistency – Be consistent in good times and challenging times

5.  Ability – Keep on learning- develop new skills – continue your education – listen and most important, it is OK to say “I don’t know” and “I need help”.

6. Take Action and Risks – Don’t be afraid to make mistakes- that is how you learn, that is how you grow

7. Communicate – Communicate – Communicate – People will tell you when to stop communicating and more important, keep interested parties in the loop and you will be respected by all.

8. Listen – one of the hardest things to do, however we all learn something and grow when we listen

9. Always focus on #1 above, nothing else matters.  Have ETHICS and INTEGRITY. Be DEPENDABLE and take RESPONSIBILITY for your actions.

Interestingly, when I lecture at various MBA programs this topic is well received by students.  Comments range from “I am glad this is being discussed” to “Its good to know these values are still important to success”.

In today’s Turbulent Times, hopefully the guidance above will provide a road to success, performance and happiness.

Best

Steve Gerbsman

Article from SFGate.

“It’s been a big couple of weeks in mobile. Verizon Wireless finally got the iPhone. Hewlett-Packard unveiled the first fruits of its Palm purchase last year. Nokia, the world’s biggest maker of handsets, abandoned its once-dominant Symbian mobile software system and demoted itself to a kind of glorified contract manufacturer of Microsoft-powered devices.

The struggle for mobile dominance has entered a new phase. Why would Nokia throw out Symbian, with its 37 percent market share, in favor of software with less than one-seventh of that? Because recently hired Chief Executive Officer Stephen Elop is convinced that Microsoft has better odds of going up against the four other mobile powers – Apple, Google, Research In Motion, and HP – and making its new Windows Phone 7 software a center of gravity for the world’s programmers, manufacturers, and consumers.

“The game has changed from a battle of devices to a war of ecosystems,” Elop told investors at a recent London news conference.

Actually, it’s the same game that created the most valuable franchises in tech history, from IBM to Microsoft to Facebook. All successfully established themselves as “platforms,” in which countless entrepreneurs and programmers developed products and applications that gave value to customers and profitability to shareholders – sucking oxygen away from rivals all the while.

Platform leaders

In the 1960s, IBM trounced Sperry and other mainframe manufacturers by creating a soup-to-nuts stack of hardware, software and services.

In PCs, Microsoft erased Apple’s early lead by signing up hardwaremakers to create cheap machines, and software companies to develop Windows versions of everything from word processors to Tetris.

Facebook vanquished social networks such as MySpace by repositioning itself as a platform – a decision that led to the creation of gamemaker Zynga and other app companies that keep Facebook’s 500 million users hanging around.

What’s different this time is scale.

“Mobile is the biggest platform war ever,” said Bill Whyman, an analyst with International Strategy & Investment. More smart phones were sold than PCs in the fourth quarter, and sales should reach $120 billion this year. That doesn’t count billions more in mobile services, ads, and e-commerce.

This war will probably last for some time, too. Unlike with PCs, where the unquestioned victor – Microsoft – quickly emerged and enjoyed years of near monopoly, no one has a divine right to dominance in mobile. Microsoft crushed its competition by forcing people to make a choice. There were far more software applications for PCs, and most didn’t work on Macs. The more Microsoft-powered machines out there, the more people wrote software for them, the more people bought them, and the bigger the whole system became. Economists have a name for that phenomenon: “network effects.”

Appealing products

All cell phones can talk to each other and handle the same websites and e-mail systems, so winning means making products that function more effectively and appealingly. That sums up Apple’s success.

Steve Jobs figured out long ago that when people spend their own money, they’ll pay for something a lot nicer than the unsexy gear the cheapskates in corporate procurement choose. While others competed on price, Apple focused on making its products reliable and easy to use. Once customers buy an iPhone and start investing in iTunes songs and apps, they tend to stick with the system and keep buying – even though there’s no proprietary lock on the proverbial door.

Apple’s huge sales volume makes carriers and suppliers more likely to agree to its terms. The software that powers everything Apple makes – all variations of the Mac operating system OS X – is as intuitive to developers as Angry Birds is to app shoppers.

The result is economic leverage of staggering power. To create a blockbuster, Apple doesn’t need to spend billions on a start-from-scratch moon-shot of a development project. It just needs to tweak a previous hit.

Take the iPad, which is in many ways a large iPod touch. Apple won’t say how much the iPad cost to develop. Consider these numbers, though: In the year that ended Sept. 30, during which Apple introduced the iPad and the iPhone 4, the company spent $1.8 billion on research and development. Over the same period, Apple’s revenue increased by $22.3 billion. Nokia spent three times as much as Apple on R&D – $5.86 billion – and increased revenue by just $1.5 billion. No wonder that Apple, whose share of total global mobile-phone sales is only 4.2 percent, gets more than half the profit generated by the industry, according to research firm Asymco.

Fast-growing Android

Even Google, Apple’s mightiest rival, got only a $5 billion increase in sales on its $3.4 billion R&D budget. It does have plenty to show for its efforts, though: Its Android platform is growing at a blistering pace. In the fourth quarter, according to research firm Canalys, twice as many Android devices shipped as iPhones.

“Google is being far more aggressive in building its platform than Microsoft ever was,” says Bill Gurley, a partner at Benchmark Capital.

Barring big surprises, the other contenders – RIM, HP, and Microsoft – are in for a slog: too dependent on mobile devices to give up, yet lacking the tools to make much progress. All lost market share in 2010 and have far fewer apps available for their devices.”

Read original post here

San Francisco, February, 2011

Successful “Date Certain M&A” of Medical Device companies, its Assets and Intellectual Property

Steven R. Gerbsman, Principal of Gerbsman Partners, Kenneth Hardesty, James Skelton, James McHugh and Dennis Sholl, members of Gerbsman Partners Board of Intellectual Capital, announced today their success in maximizing stakeholder value for two venture capital backed, medical device companies. These companies were in the obesity and cardiac mitral regurgitation spaces.

Gerbsman Partners provided Crisis Management and Investment Banking leadership, facilitated the sale of the business unit’s assets and its associated Intellectual Property. Due to market conditions, the board of directors made the strategic decision to maximize the value of the business unit and Intellectual Property. Gerbsman Partners provided leadership to the company with:

1,  Crisis Management and medical device domain expertise in developing the strategic action plans for maximizing value of the business unit, Intellectual Property and assets;
2.  Proven domain expertise in maximizing the value of the business unit and Intellectual Property through a Gerbsman Partners targeted and proprietary “Date Certain M&A Process”;
3.  The ability to “Manage the Process” among potential Acquirers, Lawyers, Creditors Management and Advisors;
4.  The proven ability to “Drive” toward successful closure for all parties at interest.

About Gerbsman Partners

Gerbsman Partners focuses on maximizing enterprise value for stakeholders and shareholders in under-performing, under-capitalized and under-valued companies and their Intellectual Property. Since 2001, Gerbsman Partners has been involved in maximizing value for 67 Technology, Life Science and Medical Device companies and their Intellectual Property and has restructured/terminated over $795 million of real estate executory contracts and equipment lease/sub-debt obligations. Since inception in 1980, Gerbsman Partners has been involved in over $2.3 billion of financings, restructurings and M&A transactions.

Gerbsman Partners has offices and strategic alliances in San Francisco, Boston, New York, Washington, DC, Alexandria, VA, Europe and Israel.

Article from GigaOm.

“A few years ago, Jeff Jarvis, a good friend of mine, published a book called What Would Google Do? When he wrote that book, Google had an aura of invincibility. Fast forward to today: Thanks to Facebook, it doesn’t seem so invincible. The new social web has passed it by. So, the question today is: What should Google do?

I’ve always maintained Google has to play to its strengths – that is, tap into its DNA of being an engineering-driven culture that can leverage its immense infrastructure. It also needs to leverage its existing assets even more, instead of chasing rainbows. In other words, it needs to look at Android and see if it can build a layer of services that get to the very essence of social experience: communication.

However, instead of getting bogged down by the old-fashioned notion of communication – phone calls, emails, instant messages and text messages – it needs to think about interactions. In other words, Google needs to think of a world beyond Google Talk, Google Chat and Google Voice.

To me, interactions are synchronous, are highly personal, are location-aware and allow the sharing of experiences, whether it’s photographs, video streams or simply smiley faces. Interactions are supposed to mimic the feeling of actually being there. Interactions are about enmeshing the virtual with the physical.

In a post earlier, I outlined that with the introduction of its unified Inbox, the constantly changing Facebook had shifted its core value proposition from being a plain vanilla social network to a communication company. Here’s a relevant bit from that post.

Facebook imagined email only as a subset of what is in reality communication. SMS, Chat, Facebook messages, status updates and email is how Zuckerberg sees the world. With the address book under its control, Facebook is now looking to become the “interaction hub” of our post-broadband, always-on lives. Having trained nearly 350 million people to use its stream-based, simple inbox, Facebook has reinvented the “communication” experience. …. Facebook as a service is amazingly effective when it focuses all its attention on what is the second order of friends – people you would like to stay in touch with, but just don’t have enough bandwidth (time) to stay in touch with. Those who matter to you the most are infinitely intimate, and as a result you communicate with them via SMS, IM Chat and voice. So far, this intimate communication has eluded Facebook. The launch of the new social inbox is a first step by Facebook to get a grip on this real world intimacy.

In 2007, I had argued that the real social network in our lives was the address book on our mobile phone. Google has access to real-world intimacy – the mobile phone address book – thanks to Android OS. All it has to do is use that as a lever to facilitate interactions.

In order to understand Google’s interaction-driven social future, one doesn’t have to look far: no further than Apple’s iTunes app store.  As you know, I have switched from BlackBerry to the iPhone, and as a result, I’ve been looking for a BBM replacement, and have been playing around with a score of apps.

In the process of searching for this app, I came across an app called Beluga, which essentially allows me to connect to my friends. And then I can create Pods (essentially Groups) with one or more of my friends. Sort of like what I did on BBM. Except, there’s more to Beluga.

It taps into my social graph (Facebook); it leverages my location, and it allows me to share photos as part of the messaging process. It’s a beautifully designed application that’s very inviting – and the experience is less communication, more interaction.

What’s beautiful about Beluga is it’s as personal and private as you want it to be. It’s just ironic that Beluga was co-founded by three Google engineers — Ben Davenport, Lucy Zhang and Jonathan Perlow — and if you see their bios, it is hardly a surprise that they ended up with an interaction-centric product like Beluga.

Yesterday, I was introduced to a new app called Yobongo, and it comes from a San Francisco startup co-founded by alumni of Justin.tv. It’s a good-looking application that leverages your location, allowing you to find people around you and to chat with them. It is at the extreme opposite of Beluga: It’s open, and you can chat with anyone. It is very real-time in nature. Of course, there are other apps like Yobongo: MessageParty, for example!

What’s common between these two apps is their ability for synchronous messaging. This messaging can, in turn, become the under-pinning of what I earlier called interactions.

Ability to interact on an ongoing basis anywhere, any time and sharing everything, from moments to emotions – is what social is all about. From my vantage point, this is what Google should focus on. If not — you know it very well — Facebook will.”

Read the original post here.

Article from SFGate.

“The hottest trends in technology also represent some of the gravest threats to corporate data security.

Mobile devices, social networking and cloud computing are opening up new avenues for both cyber criminals and competitors to access critical business information, according to speakers at this week’s RSA Conference 2011 at San Francisco‘s Moscone Center and a survey set for release this morning.

The poll of 10,000 security professionals, by Mountain View market research firm Frost & Sullivan, also concluded that corporate technology staffs are frequently ill prepared to deal with many of the new threats presented by these emerging technologies.

“The professionals are really struggling to keep up,” said Rob Ayoub, global program director for information security research at Frost & Sullivan.

Mobile: Mobile devices ranked near the top of their security concerns, coming in second behind applications, such as internally developed software and Internet browsers.

Businesses face a number of threats from the increasingly common use of smart phones and tablets by their workers, including malicious software that attacks the operating systems, or the simple loss or theft of devices often laden with corporate information.

Juniper Networks, a sponsor of the RSA conference, presented some eye-catching – if also self-serving – statistics during a session titled “Defend Your Mobile Life.”

Mark Bauhaus, an executive vice president at Juniper, said that 98 percent of mobile devices like smart phones and tablets aren’t protected with any security software, and that few users set up a password. That’s troublesome, he said, given that:

— 2 million people in the United States either lost or had their phones stolen last year;

— 40 percent of people use their smart phone for both personal and business use;

— 72 percent access sensitive information, including banking, credit card and medical records;

— 80 percent access their employer’s network over these devices without permission.

Bauhaus stressed the need to adopt mobile applications and online services – which Juniper not coincidentally provides – that remotely turn off and wipe gadgets, blacklist spammers, detect and remove viruses, and ensure that devices are safe before connecting to corporate networks.

Hackers have already tried to exploit the popularity of mobile applications by writing Trojan Horses, malicious programs that appear to be helpful apps in online markets, said two researchers from Lookout Mobile Security of San Francisco in a separate session.

Once users install the app, however, it can disable the phone, force it to execute commands or snatch information.

Since late December, two Trojans have been identified on Android phones that represented significant leaps in technological sophistication, said Kevin Mahaffey, chief technology officer of Lookout, which also develops mobile security services.

Known as Geinimi and HongTouTou, both are examples of malicious software inserted into otherwise familiar and legitimate apps.

“We’re nowhere near the level of sophistication you see in desktop malware, but it’s definitely a step up from what we’ve seen to date,” Mahaffey said.

Cloud: A Wednesday morning session titled “Cloud Computing: A Brave New World for Security and Privacy,” highlighted the considerations that businesses should bear in mind before using such a system, in which data are stored on remote server farms rather than ensconced behind a company’s own walls.

Placing corporate e-mails, human resource information or credit card numbers outside the company’s physical domain raises a number of legal, privacy and security issues, according to the panel.

Hackers go after cloud providers for the same reason that criminals rob banks, said Eran Freigenbaum, director of security for Google Apps.

“Cloud providers are going to get attacked and get attacked, because that’s where the data is,” he said.

The measure of a cloud service, like those provided by Google, Amazon.com or Salesforce.com, are how they hold up against such assaults and respond to exposed vulnerabilities, he said.”

Read original post here.